Sciweavers

3457 search results - page 60 / 692
» A Symbol Is Not a Symbol
Sort
View
35
Voted
CORR
2010
Springer
58views Education» more  CORR 2010»
15 years 20 days ago
Channel-coded Collision Resolution by Exploiting Symbol Misalignment
In random-access networks, such as the IEEE 802.11 network, different users may transmit their packets simultaneously, resulting in packet collisions. Traditionally, the collided p...
Lu Lu, Soung Chang Liew, Shengli Zhang
79
Voted
ACSC
2003
IEEE
15 years 5 months ago
Symbol Grounding and its Implications for Artificial Intelligence
In response to Searle's well-known Chinese room argument against Strong AI (and more generally, computationalism), Harnad proposed that if the symbols manipulated by a robot ...
Michael J. Mayo
PLDI
2010
ACM
15 years 5 months ago
Mixing type checking and symbolic execution
Static analysis designers must carefully balance precision and efficiency. In our experience, many static analysis tools are built around an elegant, core algorithm, but that alg...
Yit Phang Khoo, Bor-Yuh Evan Chang, Jeffrey S. Fos...
DMKD
2003
ACM
148views Data Mining» more  DMKD 2003»
15 years 5 months ago
A symbolic representation of time series, with implications for streaming algorithms
The parallel explosions of interest in streaming data, and data mining of time series have had surprisingly little intersection. This is in spite of the fact that time series data...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Bil...
112
Voted
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 6 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani